- Page 2:
ForewordAttacks from improvised exp
- Page 7 and 8:
Introduction“This is not a new wa
- Page 9 and 10:
Chapter 1FundamentalsWith the proli
- Page 11 and 12:
Fundamentals• Avoid activities. T
- Page 13 and 14:
Fundamentals• Explosive hazard. A
- Page 15 and 16:
Chapter 2Contemporary Operational E
- Page 17 and 18:
Contemporary Operational Environmen
- Page 19 and 20:
Contemporary Operational Environmen
- Page 21 and 22:
Contemporary Operational Environmen
- Page 23 and 24:
Contemporary Operational Environmen
- Page 25 and 26:
Chapter 3Improvised Explosive Devic
- Page 27 and 28:
Improvised Explosive Device ThreatF
- Page 29 and 30:
Chapter 4Improvised Explosive Devic
- Page 31 and 32:
Improvised Explosive Device Charact
- Page 33 and 34:
Improvised Explosive Device Charact
- Page 35 and 36:
Chapter 5Organizations Involved in
- Page 37 and 38:
Organizations Involved in Improvise
- Page 39 and 40:
Organizations Involved in Improvise
- Page 41 and 42:
Organizations Involved in Improvise
- Page 43 and 44:
Organizations Involved in Improvise
- Page 45 and 46:
Chapter 6Improvised Explosive Devic
- Page 47:
Improvised Explosive Device Respons
- Page 51 and 52:
Improvised Explosive Device Respons
- Page 53 and 54:
Improvised Explosive Device Respons
- Page 55 and 56:
Chapter 7Improvised Explosive Devic
- Page 57 and 58:
Improvised Explosive Device Defeat
- Page 59 and 60:
Improvised Explosive Device Defeat
- Page 61 and 62:
Improvised Explosive Device Defeat
- Page 63 and 64:
Improvised Explosive Device Defeat
- Page 65 and 66:
Improvised Explosive Device Defeat
- Page 67 and 68:
Improvised Explosive Device Defeat
- Page 69 and 70:
Chapter 8Training RequirementsUnits
- Page 71 and 72:
Training RequirementsENEMY TACTICS8
- Page 73 and 74:
Training RequirementsCompany Level
- Page 75 and 76:
Training RequirementsTable 8-2. Cri
- Page 77 and 78:
Appendix AMetric Conversion ChartTh
- Page 79 and 80:
Appendix BIntelligenceThe process o
- Page 81 and 82:
IntelligenceB-10. As with standard
- Page 83 and 84:
IntelligenceB-16. HUMINT provides t
- Page 85 and 86:
Intelligenceturn, broadcast video v
- Page 87 and 88:
IntelligenceSECTION III - PROCESS C
- Page 89 and 90: Appendix COrganization Contact Info
- Page 91 and 92: Organization Contact Information an
- Page 93 and 94: Organization Contact Information an
- Page 95 and 96: Appendix DRecording and Tracking Im
- Page 97 and 98: Recording and Tracking Improvised E
- Page 99 and 100: Recording and Tracking Improvised E
- Page 101 and 102: Appendix ETactics, Techniques, and
- Page 103 and 104: Tactics, Techniques, and Procedures
- Page 105 and 106: Tactics, Techniques, and Procedures
- Page 107 and 108: Appendix FMilitary SearchMilitary s
- Page 109 and 110: Military SearchPRINCIPLES• Ambush
- Page 111 and 112: Military Search• Potential VBIED
- Page 113 and 114: Appendix GSpecialized EquipmentIn g
- Page 115 and 116: Specialized EquipmentCASSPIRG-3. Th
- Page 117 and 118: Specialized EquipmentROBOTSFigure G
- Page 119 and 120: Specialized EquipmentFigure G-12. A
- Page 121 and 122: Specialized Equipment• Two shock
- Page 123 and 124: Appendix HTraining ResourcesTASKSTh
- Page 125 and 126: Training ResourcesH-9. A video avai
- Page 127 and 128: GlossarySECTION I - ACRONYMS AND AB
- Page 129 and 130: GlossaryDOTLDDOTMLPFDirectorate of
- Page 131 and 132: GlossaryIVMMDIWJCMECJDIGSJIEDDJIMJI
- Page 133 and 134: GlossaryOPORD operation orderops op
- Page 135 and 136: GlossaryWITWMDwwwweapons intelligen
- Page 137 and 138: ReferencesSOURCES USEDThese are the
- Page 139: References*FMI 4-30.5. Modular EOD